SlideShare a Scribd company logo
1 of 38
Download to read offline
10th INTERNATIONAL CONGRESS
ON INTERNAL CONTROL, AUDIT AND ANTI-FRAUD,
          ANTI-CORRUPTION ISSUES



    MODELING
   THE PROCESS
     OF FRAUD
 RISK ASSESSMENT
         Dr. Dimiter Dinev, CFE
 Founder & Chairman of Association for
Counteraction to Economic Fraud (ACEF)
                       1
                                             1
X PIKW CONGRESS IN KRAKOW
            2
                            2
KRAKOW IX -X PIKW CONGRESSES
             3
                               3
KRAKOW X PIKW CONGRESS
          4
                         4
KRAKOW X PIKW CONGRESSES
           5
                           5
KRAKOW IX -X PIKW CONGRESSES
             6
                               6
KRAKOW IX -X PIKW CONGRESSES
             7
                               7
KRAKOW IX -X PIKW CONGRESSES
             8
                               8
KRAKOW X PIKW CONGRESSES
           9
                           9
KRAKOW X PIKW CONGRESSES
           10
                           10
KRAKOW IX -X PIKW CONGRESSES
             11
                               11
KRAKOW IX -X PIKW CONGRESSES
             12
                               12
13
     13
IX PIKW CONGRESS KRAKOW 2010
             14
                               14
2009-2011 ACEF MODELS
• Dinev’s Compass for Fraud
 Detection - Fraud Magazine,
 ACFE, 1/2009, Seattle University

• Dinev’s Puzzle for Fraud
 Investigation-2010, Krakow

• 3D Fraud Risk Assessment
 Model-today
                        15
                                    15
3D MODEL FOR FRAUD RISK
      ASSESSMENT

• FUNCTIONAL
DIMENSION
• METHODOLOGICAL
DIMENSION
• TIMING DIMENSION

                   16
                          16
3D MODEL FOR FRAUD RISK
    ASSESSMENT - 2011

• A STAND-ALONE SERVICE

• A PART OF THE ERM     (THE
 ENTERPRISE RISK
 MANAGEMENT)
• AN AUDIT RESPONSIBILITY
 UNDER ISA 240 or SAS 99
                   17
                               17
WHO WILL BE THE ACTORS?
•   Internal Auditors

•   Financial Controllers

•   Compliance Officers

•   Fraud Examiners

•   Certified Internal Control Auditors/
    Specialists (CICA/CICS)

•   External Auditors as a stand-alone
    engagement
                             18
                                           18
3D MODEL FOR FRAUD RISK
   ASSESSMENT GOALS
• A NEW BUSINESS
OPPORTUNITY
• SIMPLE AND
UNDERSTANDABLE
• WORLD WIDE APPLICABLE

• COST EFFECTIVE

• USABLE, OF COURSE
                   19
                          19
RISK AND FRAUD RISK ASSESSMENT

• RISK - a likelihood something
 not good to be happened
• CHANCE - a likelihood
 something good to be
 happened
• FRAUD - common and
 specific
• FRAUD RISK ASSESSMENT
 - to increase the chance for
 fraud deterrence         20
                                  20
FRAUD RISK ASSESSMENT
        PROCESS

 Systematic process of obtaining,
receiving and analyzing data as to
 determine the likelihood of fraud
  occurrence in the organization
  and an adequate response and
  timely decisions to be taken by
  the stakeholders as to increase
the chance of the fraud deterrence

                          21
                                     21
FRAUD RISK ASSESSMENT
       PROCESS - ELEMENTS
•   Systematic process for        •   An adequate response
                                      and timely decisions to
•   Obtaining, receiving              be taken
    and analyzing data
                                  •   By the stakeholders
•   To determine the
    likelihood of fraud           •   To increase the chance
    occurrence                        of fraud deterrence


                             22
                                                                22
3D MODEL FOR FRAUD RISK
      ASSESSMENT

• FUNCTIONAL
DIMENSION
• METHODOLOGICAL
DIMENSION
• TIMING DIMENSION

                   23
                          23
FUNCTIONAL DIMENSION -
         WHAT TO DO?
•   Interviews with the client as to provide him/her with awareness about the nature,
    scope and goals of the fraud risk assessment engagement - this is not an audit, the
    types of fraud are…, there would be fraud risk there, because…, fraud terminology!

•   Collecting, receiving and analyzing data about the organization - about bylaws,
    business cycle, activities, processes, transactions

•    Collecting, receiving and analyzing data about the existing internal controls and
    those applied for fraud deterrence (if any?!)

•   Determination of the opportunities for fraud occurrence - ineffective controls,
    controls override, no anti-fraud controls

•   Description of the possible fraud scenarios, types of fraud and schemes, specific for
    the different levels, processes and activities of the organization

•   Ranging the fraud risk occurrence based on quantitative and qualitative measures
    and criteria - 2 RANGES

•   Development of proposal for adequate response and timely measures, if necessary!
                                                24
                                                                                            24
KNOWLEDGE ABOUT FRAUD
      THEORY AND PRACTICE
•   TAXONOMY OF FRAUD AND FRAUD
    TERMINOLOGY

•   ACFE FRAUD TREE - corruption,
    misappropriation of assets, financial statements
    and other statements fraud

•   TYPES OF FRAUD - by activities, by direction,
    by countries, specific for EU, USA etc.

•   FRAUD INDICATORS - red flags, irregularities,
    errors, abnormals etc. 25
                                                       25
FRAUD SCENARIO
•   WHAT          •   HOW MUCH

•   WHERE         •   HOW TO CONCEAL

•   WHO           •   HOW TO CONVERT

•   WHEN          •   WHAT’S THE LAW/
                      RULE
•   WHO ELSE
                  •   WHAT CONTROLS ARE
•   INTENT            OVERRIDDEN

                  •   TIME LAG FOR
                      DETECTION
                                          26
METHODOLOGICAL
          DIMENSION - HOW?


•   Methods for Collecting Data

•   Techniques for Collecting Data

•   Analysis Methodology



                            27
                                     27
METHODS FOR
         COLLECTING DATA

•   DATA MINING

•   DISCOVERY SAMPLING

•   DOCUMENT INSPECTION

•   BE ON THE PLACE


                      28
                           28
TECHNIQUES FOR
           COLLECTING DATA

•   Internet Search - Google, Lexus-Nexus, national
    search engines

•   Checking formats and content for an authenticity

•   Using specialized software - Picalo

•   Walking, Talking, Listening, Watching

                             29
                                                       29
ANALYSIS METHODOLOGY


•   Comparing data and trends

•   Ratios analysis

•   What-if Analysis

•   Cost Benefit Analysis


                            30
                                 30
TIMING DIMENSION - HOW
      MUCH TIME (MONEY)?

•   PREPARATION

•   PERFORMANCE

•   CONCLUSION AND

•   REPORT PRESENTATION


                      31
                             31
TIMING DIMENSION -
          PREPARATION

•   CREATING AND TRAINING A
    TEAM

•   PLANNING

•   ORGANIZING

•   PREPARING A FRAUD
    TERMINOLOGY FOR THE CASE

                       32
                               32
TIMING DIMENSION -
                 PERFORMANCE
•   FOLLOWING TIME SHEETS SCHEDULE

•   BEING ON THE PLACE

•   VISITS ON THE SIDES

•   DISCUSSIONS WITH THE CLIENT AND TEAM MEMBERS

•   RANKING THE FRAUD RISK - CRITERIA, 2 RANGES ONLY

    •   THERE IS NOT A FRAUD RISK

    •   THERE IS A FRAUD RISK

        •   quantitative measures

        •   qualitative measures
                                     33
                                                       33
TIMING DIMENSION -
          CONCLUSION

•   MAKING CONCLUSIONS

•   PREPARING
    RECOMMENDATIONS - “O”
    TOLERANCE

•   REPORT PREPARATION AND
    PRESENTATION

                         34
                              34
3D MODEL FOR FRAUD RISK
 ASSESSMENT - OUTCOMES
• A NEW BUSINESS
OPPORTUNITY
• SIMPLE AND
UNDERSTANDABLE
• WORLD WIDE APPLICABLE

• COST EFFECTIVE

• USABLE, OF COURSE
                   35
                          35
WHO WILL BE THE ACTORS
          TOMORROW?
•   Internal Auditors

•   Financial Controllers

•   Compliance Officers

•   Fraud Examiners

•   Certified Internal Control Auditors/
    Specialists (CICA/CICS)

•   External Auditors as a stand-alone
    engagement
                             36
                                           36
YOUR QUESTIONS AND MY
   ANSWERS, PLEASE!

I WOULD BE GLAD TO ANSWER
    YOUR QUESTIONS AND
   TO ACCEPT ALL OF YOUR
        REASONABLE
    RECOMMENDATIONS!


               37
                            37
THANK YOU FOR YOUR
  KIND ATTENTION!

Dr. Dimiter Dinev, CFE

  Chairman of ACEF

 dinev@acefraud.org

  www.acefraud.org

   www.iepinet.eu

                     38
                          38

More Related Content

Similar to Modeling Fraud Risk Assessment

Translation_twilight_zone_dealing_with_uncertainty_en
Translation_twilight_zone_dealing_with_uncertainty_enTranslation_twilight_zone_dealing_with_uncertainty_en
Translation_twilight_zone_dealing_with_uncertainty_enVyacheslav Guzovsky
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury, LLP
 
It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013IT Club GTA
 
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act easy2comply
 
Hazard risk management
Hazard risk management Hazard risk management
Hazard risk management AmitMasand5
 
Presentation (11)-1.pptx
Presentation (11)-1.pptxPresentation (11)-1.pptx
Presentation (11)-1.pptxAmitMasand5
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghNapier University
 
Betaleadership, méthodes agiles, pour quoi faire
Betaleadership, méthodes agiles, pour quoi faireBetaleadership, méthodes agiles, pour quoi faire
Betaleadership, méthodes agiles, pour quoi faireSylvain Loubradou
 
Roy Millard - the basics and latest thinking on Assurance presentation
Roy Millard - the basics and latest thinking on Assurance presentationRoy Millard - the basics and latest thinking on Assurance presentation
Roy Millard - the basics and latest thinking on Assurance presentationAssociation for Project Management
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security ManagementLuis Martins
 
Data Science Governance
Data Science GovernanceData Science Governance
Data Science GovernanceBart Hamers
 
Risk management - A short course
Risk management  - A short courseRisk management  - A short course
Risk management - A short courseMalcolm Peart
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Alessa
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)Tommy Vandepitte
 
Data mining and Forensic Audit
Data mining and Forensic AuditData mining and Forensic Audit
Data mining and Forensic AuditDhruv Seth
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarResilient Systems
 

Similar to Modeling Fraud Risk Assessment (20)

Translation_twilight_zone_dealing_with_uncertainty_en
Translation_twilight_zone_dealing_with_uncertainty_enTranslation_twilight_zone_dealing_with_uncertainty_en
Translation_twilight_zone_dealing_with_uncertainty_en
 
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
McKonly & Asbury Webinar - Fraud Prevention and Detection: Surprise Fraudster...
 
It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013It_Club_NCP_Risk_Management_26_03_2013
It_Club_NCP_Risk_Management_26_03_2013
 
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
Foreign Corrupt Practices Act of 1977 UK Anti-Bribery Act
 
Business Plan
Business PlanBusiness Plan
Business Plan
 
Hazard risk management
Hazard risk management Hazard risk management
Hazard risk management
 
Presentation (11)-1.pptx
Presentation (11)-1.pptxPresentation (11)-1.pptx
Presentation (11)-1.pptx
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian RainsburghEndpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
 
Betaleadership, méthodes agiles, pour quoi faire
Betaleadership, méthodes agiles, pour quoi faireBetaleadership, méthodes agiles, pour quoi faire
Betaleadership, méthodes agiles, pour quoi faire
 
Rm 11-1
Rm 11-1Rm 11-1
Rm 11-1
 
Roy Millard - the basics and latest thinking on Assurance presentation
Roy Millard - the basics and latest thinking on Assurance presentationRoy Millard - the basics and latest thinking on Assurance presentation
Roy Millard - the basics and latest thinking on Assurance presentation
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security Management
 
Data Science Governance
Data Science GovernanceData Science Governance
Data Science Governance
 
Risk management - A short course
Risk management  - A short courseRisk management  - A short course
Risk management - A short course
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
 
GDPR project board deck (example)
GDPR project board deck (example)GDPR project board deck (example)
GDPR project board deck (example)
 
Data mining and Forensic Audit
Data mining and Forensic AuditData mining and Forensic Audit
Data mining and Forensic Audit
 
Metrics evolution breakfast edition
Metrics evolution breakfast editionMetrics evolution breakfast edition
Metrics evolution breakfast edition
 
My approach to CRO Role
My approach to CRO RoleMy approach to CRO Role
My approach to CRO Role
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 

Recently uploaded

Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 

Recently uploaded (20)

Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 

Modeling Fraud Risk Assessment

  • 1. 10th INTERNATIONAL CONGRESS ON INTERNAL CONTROL, AUDIT AND ANTI-FRAUD, ANTI-CORRUPTION ISSUES MODELING THE PROCESS OF FRAUD RISK ASSESSMENT Dr. Dimiter Dinev, CFE Founder & Chairman of Association for Counteraction to Economic Fraud (ACEF) 1 1
  • 2. X PIKW CONGRESS IN KRAKOW 2 2
  • 3. KRAKOW IX -X PIKW CONGRESSES 3 3
  • 4. KRAKOW X PIKW CONGRESS 4 4
  • 5. KRAKOW X PIKW CONGRESSES 5 5
  • 6. KRAKOW IX -X PIKW CONGRESSES 6 6
  • 7. KRAKOW IX -X PIKW CONGRESSES 7 7
  • 8. KRAKOW IX -X PIKW CONGRESSES 8 8
  • 9. KRAKOW X PIKW CONGRESSES 9 9
  • 10. KRAKOW X PIKW CONGRESSES 10 10
  • 11. KRAKOW IX -X PIKW CONGRESSES 11 11
  • 12. KRAKOW IX -X PIKW CONGRESSES 12 12
  • 13. 13 13
  • 14. IX PIKW CONGRESS KRAKOW 2010 14 14
  • 15. 2009-2011 ACEF MODELS • Dinev’s Compass for Fraud Detection - Fraud Magazine, ACFE, 1/2009, Seattle University • Dinev’s Puzzle for Fraud Investigation-2010, Krakow • 3D Fraud Risk Assessment Model-today 15 15
  • 16. 3D MODEL FOR FRAUD RISK ASSESSMENT • FUNCTIONAL DIMENSION • METHODOLOGICAL DIMENSION • TIMING DIMENSION 16 16
  • 17. 3D MODEL FOR FRAUD RISK ASSESSMENT - 2011 • A STAND-ALONE SERVICE • A PART OF THE ERM (THE ENTERPRISE RISK MANAGEMENT) • AN AUDIT RESPONSIBILITY UNDER ISA 240 or SAS 99 17 17
  • 18. WHO WILL BE THE ACTORS? • Internal Auditors • Financial Controllers • Compliance Officers • Fraud Examiners • Certified Internal Control Auditors/ Specialists (CICA/CICS) • External Auditors as a stand-alone engagement 18 18
  • 19. 3D MODEL FOR FRAUD RISK ASSESSMENT GOALS • A NEW BUSINESS OPPORTUNITY • SIMPLE AND UNDERSTANDABLE • WORLD WIDE APPLICABLE • COST EFFECTIVE • USABLE, OF COURSE 19 19
  • 20. RISK AND FRAUD RISK ASSESSMENT • RISK - a likelihood something not good to be happened • CHANCE - a likelihood something good to be happened • FRAUD - common and specific • FRAUD RISK ASSESSMENT - to increase the chance for fraud deterrence 20 20
  • 21. FRAUD RISK ASSESSMENT PROCESS Systematic process of obtaining, receiving and analyzing data as to determine the likelihood of fraud occurrence in the organization and an adequate response and timely decisions to be taken by the stakeholders as to increase the chance of the fraud deterrence 21 21
  • 22. FRAUD RISK ASSESSMENT PROCESS - ELEMENTS • Systematic process for • An adequate response and timely decisions to • Obtaining, receiving be taken and analyzing data • By the stakeholders • To determine the likelihood of fraud • To increase the chance occurrence of fraud deterrence 22 22
  • 23. 3D MODEL FOR FRAUD RISK ASSESSMENT • FUNCTIONAL DIMENSION • METHODOLOGICAL DIMENSION • TIMING DIMENSION 23 23
  • 24. FUNCTIONAL DIMENSION - WHAT TO DO? • Interviews with the client as to provide him/her with awareness about the nature, scope and goals of the fraud risk assessment engagement - this is not an audit, the types of fraud are…, there would be fraud risk there, because…, fraud terminology! • Collecting, receiving and analyzing data about the organization - about bylaws, business cycle, activities, processes, transactions • Collecting, receiving and analyzing data about the existing internal controls and those applied for fraud deterrence (if any?!) • Determination of the opportunities for fraud occurrence - ineffective controls, controls override, no anti-fraud controls • Description of the possible fraud scenarios, types of fraud and schemes, specific for the different levels, processes and activities of the organization • Ranging the fraud risk occurrence based on quantitative and qualitative measures and criteria - 2 RANGES • Development of proposal for adequate response and timely measures, if necessary! 24 24
  • 25. KNOWLEDGE ABOUT FRAUD THEORY AND PRACTICE • TAXONOMY OF FRAUD AND FRAUD TERMINOLOGY • ACFE FRAUD TREE - corruption, misappropriation of assets, financial statements and other statements fraud • TYPES OF FRAUD - by activities, by direction, by countries, specific for EU, USA etc. • FRAUD INDICATORS - red flags, irregularities, errors, abnormals etc. 25 25
  • 26. FRAUD SCENARIO • WHAT • HOW MUCH • WHERE • HOW TO CONCEAL • WHO • HOW TO CONVERT • WHEN • WHAT’S THE LAW/ RULE • WHO ELSE • WHAT CONTROLS ARE • INTENT OVERRIDDEN • TIME LAG FOR DETECTION 26
  • 27. METHODOLOGICAL DIMENSION - HOW? • Methods for Collecting Data • Techniques for Collecting Data • Analysis Methodology 27 27
  • 28. METHODS FOR COLLECTING DATA • DATA MINING • DISCOVERY SAMPLING • DOCUMENT INSPECTION • BE ON THE PLACE 28 28
  • 29. TECHNIQUES FOR COLLECTING DATA • Internet Search - Google, Lexus-Nexus, national search engines • Checking formats and content for an authenticity • Using specialized software - Picalo • Walking, Talking, Listening, Watching 29 29
  • 30. ANALYSIS METHODOLOGY • Comparing data and trends • Ratios analysis • What-if Analysis • Cost Benefit Analysis 30 30
  • 31. TIMING DIMENSION - HOW MUCH TIME (MONEY)? • PREPARATION • PERFORMANCE • CONCLUSION AND • REPORT PRESENTATION 31 31
  • 32. TIMING DIMENSION - PREPARATION • CREATING AND TRAINING A TEAM • PLANNING • ORGANIZING • PREPARING A FRAUD TERMINOLOGY FOR THE CASE 32 32
  • 33. TIMING DIMENSION - PERFORMANCE • FOLLOWING TIME SHEETS SCHEDULE • BEING ON THE PLACE • VISITS ON THE SIDES • DISCUSSIONS WITH THE CLIENT AND TEAM MEMBERS • RANKING THE FRAUD RISK - CRITERIA, 2 RANGES ONLY • THERE IS NOT A FRAUD RISK • THERE IS A FRAUD RISK • quantitative measures • qualitative measures 33 33
  • 34. TIMING DIMENSION - CONCLUSION • MAKING CONCLUSIONS • PREPARING RECOMMENDATIONS - “O” TOLERANCE • REPORT PREPARATION AND PRESENTATION 34 34
  • 35. 3D MODEL FOR FRAUD RISK ASSESSMENT - OUTCOMES • A NEW BUSINESS OPPORTUNITY • SIMPLE AND UNDERSTANDABLE • WORLD WIDE APPLICABLE • COST EFFECTIVE • USABLE, OF COURSE 35 35
  • 36. WHO WILL BE THE ACTORS TOMORROW? • Internal Auditors • Financial Controllers • Compliance Officers • Fraud Examiners • Certified Internal Control Auditors/ Specialists (CICA/CICS) • External Auditors as a stand-alone engagement 36 36
  • 37. YOUR QUESTIONS AND MY ANSWERS, PLEASE! I WOULD BE GLAD TO ANSWER YOUR QUESTIONS AND TO ACCEPT ALL OF YOUR REASONABLE RECOMMENDATIONS! 37 37
  • 38. THANK YOU FOR YOUR KIND ATTENTION! Dr. Dimiter Dinev, CFE Chairman of ACEF dinev@acefraud.org www.acefraud.org www.iepinet.eu 38 38